No products in the cart.
CompTIA Cloud+ (CV0-004) Version 1.0.7 Exam Questions
Page 8 of 30
141.
In a shared responsibility model, who is responsible for the databases of an IaaS service?
-
Consumer only
-
CSP only
-
CSP and consumer
-
CASB
Correct answer: Consumer only
According to the shared responsibility model, consumers are responsible for databases in IaaS service models. The cloud service provider (CSP) is not.
A cloud access security broker (CASB) is a cloud security solution that helps enforce access-related policies.
142.
What type of redundancy allows a cluster to withstand the complete loss of a system?
-
N + 1
-
Blue-Green
-
Five nines
-
MPLS
Correct answer: N + 1
N + 1 redundancy is used to describe a cluster that can withstand the loss of a single system without failure.
Blue-Green is a software deployment model.
Five nines is a term used to describe 99.999% uptime.
Multiprotocol label switching (MPLS) is a networking technique.
143.
What BEST describes the difference between a vulnerability assessment and a penetration test?
-
A penetration test simulates attacks, a vulnerability assessment does not
-
A penetration test focuses on digital assets, a vulnerability assessment focuses on physical assets
-
A penetration test focuses on cybersecurity, a vulnerability assessment focuses on software quality
-
A penetration test focuses on physical assets, a vulnerability assessment focuses on digital assets
Correct answer: A penetration test simulates attacks, a vulnerability assessment does not
Penetration tests try to exploit vulnerabilities and compromise systems or networks. Vulnerability assessments enumerate vulnerabilities.
Both are related to cybersecurity and can involve a wide range of digital or physical assets.
144.
You have monitored and collected resource metrics for the last 12 months. Your budget request for next year's cloud capacity requirements is due in the next 60 days.
How can you BEST use the resource information you currently have to make the budget request?
-
Forecast capacity requirements
-
Run a regression test on the data
-
Request maximum capacity as a buffer
-
You cannot use this information
Correct answer: Forecast capacity requirements
Since you have 12 months' worth of resource utilization and performance information, you will be able to trend and calculate your requirements for the next 12 months with accuracy.
Regression testing is about testing software for issues after an update or upgrade.
Requesting maximum capacity as a buffer would not make the best use of the data.
145.
What does an HTTP PUT operation do?
-
Modify a resource
-
Create a resource
-
Copy a resource
-
Read data from a resource
Correct answer: Modify a resource
Common HTTP operations used with RESTful APIs include:
- GET- Reads data or retrieves a resource
- POST- Creates a resource
- PUT- Modifies a resource
- DELETE- Deletes a resource
146.
Which of the following is an example of increased read/write storage speed?
-
IOPS increasing from 60 to 80
-
Threads decreasing from 10 to 1
-
Disk utilization increasing from 40% to 90%
-
RAM increasing from 8GB to 16GB
Correct answer: IOPS increasing from 60 to 80
Input/output operations per second (IOPS) is a measurement of reads or writes from storage per second. Higher IOPS numbers indicate increased read/write storage speed.
Threads are related to CPUs, not storage.
Disk utilization increasing from 40% to 90% would not necessarily increase read/write storage speed.
RAM is memory, not storage. Increasing RAM would not directly increase read/write storage speed, although it can improve performance and may indirectly influence IOPS numbers.
147.
What type of cryptography uses curves instead of large prime number factors?
-
ECC
-
KMS
-
GENEVE
-
CA
Correct answer: ECC
Elliptic curve cryptography (ECC) is a type of cryptography that uses curves instead of prime number factors. If an ECC key has the same length as a key created using prime number factors, the ECC key is considered stronger.
A key management system (KMS) is a system used to manage keys throughout the key lifecycle.
GENEVE is an encapsulation method.
A certificate authority (CA) is the root of trust in public key infrastructure (PKI).
148.
You are setting up a test plan for your compute resources. Which metric or metrics should you monitor?
-
Hypervisor and CPU utilization
-
Input/output operations per second
-
Average and peak bytes sent/received
-
Average and peak memory pools
Correct answer: Hypervisor and CPU utilization
Physical servers are divided up into virtual machines using a hypervisor. Monitoring the hypervisor allows you to see if the virtual machines are creating a performance bottleneck. CPU utilization informs an organization if one or more virtual machines are experiencing high utilization, thereby requiring the virtual machine load to be balanced across the physical server.
The other answers are related to resources other than compute.
Input/output operations per second are related to disk.
Average and peak bytes sent/received are related to network.
Average and peak memory pools are related to memory (RAM).
149.
You are troubleshooting a LAN connectivity issue on a Windows server. You suspect there may be an issue with IP and MAC address mappings.
What command would allow you to list the IP addresses that are associated with a given MAC address on the local system?
-
arp -a
-
ping -t
-
ipconfig /all
-
ipconfig --all
Correct answer: arp -a
arp -a will list the local ARP table on a Windows system. The ARP table shows IP address to MAC address relationships.
ping tests for connectivity.
ipconfig displays information about local network interfaces.
150.
Alex, a systems administrator at Acme Inc., needs to troubleshoot why an application is not responding to HTTP POST requests from a Windows client on a different subnet.
Alex wants to begin troubleshooting by determining how many network hops are between the Windows client and the Linux virtual server running the application.
What Windows command can Alex use to enumerate the network path from the Windows client to the Linux virtual machine?
-
tracert
-
traceroute
-
tcpdump
-
route
Correct answer: tracert
traceroute and tracert enumerate the network "hops" between devices. tracert is the Windows version of the command. traceroute is the Linux version of the command.
route allows users to print and manipulate the local routing table.
tcpdump is a packet capture utility that allows users to "sniff" traffic on a network interface.
151.
You deployed a new global cloud-based e-commerce system over Labor Day for a new line of products your company is selling. During the after-Thanksgiving sale, customers on the U.S. West Coast were calling Customer Support, complaining that they could not access the system for over four hours. When they were finally able to log in, performance was very poor. However, customers in the rest of the U.S., as well as other countries, were not reporting any incidents. You have been asked to troubleshoot this deployment issue.
What is the MOST likely cause of this type of issue?
-
Regional cloud service provider outage
-
End user internet connectivity issues
-
Licensing issues
-
Integration issues relating to different cloud platforms
Correct answer: Regional cloud service provider outage
Cloud-based global deployments typically span multiple cloud data centers. This is done so that users in different countries have optimum network connectivity and a good response time.
In this example, the likely cause is that there was an outage in one of the data centers since they were not able to access the system for several hours. The fact that they could log in after four hours but with poor performance indicates that the cloud provider re-directed the traffic to another one of their data centers, which caused latency.
152.
A product manager was given metrics from a system deployed in a test environment. They indicated that they needed the metrics from a production system instead.
Why would the product manager want network metrics from the production system versus the test system?
-
The production environment is where the users do their daily work and is the true indicator of performance
-
Test systems do not use a network
-
Test networks do not measure bytes sent or received
-
The test environment is always three times the size of the production environment
Correct answer: The production environment is where the users do their daily work and is the true indicator of performance
Test systems are set up to be an exact replica (meaning they use the same network and equipment and track the same metrics) of the production environment but at a smaller scale. The production system is the true indicator of user workload on a daily basis.
153.
What configuration management tool uses playbooks written in YAML?
-
Ansible
-
ELK
-
Grafana
-
GraphQL
Correct answer: Ansible
Ansible is a configuration management tool that uses YAML playbooks.
ELK is a technology stack consisting of Elasticsearch, Logstash, and Kibana.
Grafana is a graphing and data visualization tool.
GraphQL is a type of API.
154.
What BEST describes the difference between an HTTP PUT and an HTTP POST operation?
-
A PUT updates a resource, a POST creates a resource
-
A POST updates a resource, a PUT creates a resource
-
PUT and POST are synonymous
-
Windows systems use PUT, Linux systems use POST
Correct answer: A PUT updates a resource, a POST creates a resource
HTTP PUT operations update an HTTP resource.
HTTP POST operations create a resource.
HTTP operations are standard across Windows, Linux, and other operating systems.
155.
An administrator enables auditing on multiple systems throughout the network.
Which of the following statements is TRUE about what will likely happen to the systems as a result?
-
System performance will decrease
-
Fewer logs will be recorded
-
System performance will improve
-
Login attempts will be blocked until the audit is over
Correct answer: System performance will decrease
Audit activities consume resources that can skew and decrease system performance. Auditing provides detailed information in audit logs that may not otherwise be captured and can be useful for security and debugging purposes.
Auditing does not directly block any login attempts.
156.
Your organization has developed a suite of consumer applications that are copyrighted.
What set of technologies can you use to prevent data from being printed, emailed, or downloaded?
-
Digital rights management
-
Document rights management
-
Download protection management
-
Intellectual property management
Correct answer: Digital rights management
Digital rights management (DRM) is a set of access control technologies that enforce restrictions on the unauthorized use, modification, and distribution of proprietary and copyrighted assets.
Document rights management and download protection management are distractor answers.
Intellectual property management is a broader term that applies to activity related to protecting intellectual property (IP). DRM is the more specific and appropriate answer for this question.
157.
Acme Inc. has copies of their application code in their code repository. They are:
- Dev- Where developers are making changes for the day
- Feature- Where a new feature is being worked on
- Main- The primary source for the production application
What are these copies of the code called?
-
Branches
-
Commits
-
CI
-
CD
Correct answer: Branches
Code branches help teams work on different portions of a program at the same time.
Commits are changes to code in a code repository.
CI (continuous integration) is the practice of regularly and automatically building and testing code.
CD (continuous delivery or deployment) goes a step (or two) further than CI and automatically deploys the changes to a test or production environment.
158.
What Ansible objects define automation procedures used for configuration management?
-
Playbooks
-
Runbooks
-
GraphQLs
-
SOAPs
Correct answer: Playbooks
Ansible playbooks are sets of YAML statements that define the automation procedures the Ansible platform uses.
Runbooks is a more generic term that describes automations for a wide range of IT tasks.
GraphQL and SOAP are types of APIs.
159.
Alex, a systems administrator at Acme Inc., was troubleshooting an issue on a firewall appliance and made several configuration changes. A few hours later, users with IP addresses in the range 203.0.113.0/24 report they can no longer access the network the firewall protects. Users from the 198.51.100.0/24 network report no issues.
Users from both networks should be able to access the network behind the firewall, and there were no problems before Alex made changes.
What MOST likely explains the problem?
-
Alex input an incorrect ACL entry
-
The 203.0.113.0/24 network was hacked
-
Alex input a default ALLOW rule in the firewall
-
Alex deleted a DENY rule for 198.51.100.0/24
Correct answer: Alex input an incorrect ACL entry
An incorrect access control list (ACL) entry that blocks 203.0.113.0/24 would explain the symptoms and is most likely because Alex was making changes before the issue was reported.
While a hack is possible, it is not supported by any of the information in the question.
An ALLOW rule would not block traffic.
Deleting a DENY rule for another network should not cause 203.0.113.0/24 to have connectivity issues.
160.
What metric is used to measure how long a process waits to use a CPU for processing?
-
CPU wait time
-
CPU idle time
-
Process wait time
-
Process idle time
Correct answer: CPU wait time
CPU wait time is a metric that measures how long a process or thread waits for a CPU before it performs processing functions.
CPU idle time is time when a CPU is not being utilized.
Process wait time and process idle time are distractor answers and are not standard metrics.